
Yasir Arfat MalkaniUniversity of Sindh · Institute of Mathematics and Computer Science
Yasir Arfat Malkani
PhD
About
32
Publications
18,327
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
135
Citations
Citations since 2017
Introduction
Additional affiliations
October 2006 - December 2010
January 2004 - present
Publications
Publications (32)
Due to the rapid growth of small and smart hand-held devices, mobile ad hoc networks (MANets) are becoming very common nowadays. MANets may consist of a number of small hand-held devices having limited resources in terms of memory, battery and processing power. In order to provide services to the users, these devices are capable of communicating wi...
Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many...
Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many...
Over the past decades, e-commerce have switched to Web services. Web services offers flexibility and interoperability of independent functions that are platform independent software applications and perform a specific task. Private and public institutions in the developed nations are offering web services. These include service such as online appoi...
Pervasive computing offers environments in which user needs or tasks are fulfilled without demanding their attention. Context-aware service composition is a central aspect to achieving this, in which services are discovered and composed in response to context to meet user needs. Since pervasive computing environments are inherently dynamic and hete...
Security in Wireless Sensor Networks has remained one of the critical and active research realms since last decade. Due to their applications, WSNs are subjective to be deployed in physically hostile environments, where they are vulnerable to various security attacks. The security issue becomes more challenging when sensor nodes are supposed to be...
Context-aware adaptation is a rudimentary prerequisite for pervasive computing applications. It enables applications to adapt themselves in response to contextual changes in order to satisfy user needs and improve user experience with minimal or no user intervention. In existing adaptation approaches, various concerns involved in adaptation process...
Wireless Sensor Network (WSNs) are commonly deployed in hostile (unattended) and open environments, where it is easy for an attacker to physically capture some of the legitimate nodes, copy credentials, reprogram them and re-deploy them in the WSN. Such type of attack is called Node Replication or Clone Node Attack. With this attack an attacker can...
WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or mor...
Pervasive Computing Environments are composed of heterogeneous services. Pervasive computing applications need to discover the service(s) based on context (e.g. user preferences, user location, user activity, etc) and interact with them to perform tasks that support us in everyday life with minimal or no user distraction. This makes discovery proto...
Security and privacy remain to be a major concern for the computing world – from traditional wired networks to modern mobile ad-hoc networks (MANETs) and ubiquitous/pervasive computing systems. Ubiquitous computing systems vary from conventional computing systems due to several reasons, such as ubiquitous computing systems are by nature ad hoc, mor...
Ubiquitous computing systems are becoming more common nowadays. Usually, these systems are composed of several modern hand-held devices, which support wireless communication in some form, such as WiFi, IrDA, Bluetooth, etc. Since wireless communication is open to everyone, the issue is how to pair two unassociated devices securely. Consequently, a...
Recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and...
Sindhi language is primarily spoken in the Sindh province of Pakistan, and in some parts of India. Languages phonemic inventory include vowels, consonants and diphthongs. This paper presents acoustic analysis and properties of the glide consonants of Sindhi. Glides are considered having stable and predictable formant structure and associated acoust...
A number of traffic characterization studies have been carried out on wireless LANs, which indicate that the wireless settings pose major challenges, especially for high bandwidth and delay sensitive applications. This paper aims to evaluate a number of Quality of Service (QoS) parameters related to video conferencing over three major WLAN Standard...
Context-awareness is an essential requirement for pervasive computing
applications, which enables them to adapt and perform tasks based on context.
One of the adaptive features of context-awareness is contextual
reconfiguration. Contextual reconfiguration involves discovering remote
service(s) based on context and binding them to the application co...
Context-aware adaptation is a central aspect of pervasive computing
applications, enabling them to adapt and perform tasks based on contextual
information. One of the aspects of context-aware adaptation is reconfiguration
in which bindings are created between application component and remote services
in order to realize new behaviour in response to...
Ad-hoc interactions between devices over wireless networks present a security problem: the generation of shared secrets to initialize secure communication over a medium that is inherently vulnerable to various attacks. However, these scenarios can also build on physical security of spaces by using protocols in which users visibly demonstrate their...
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computing systems due to the ad-hoc and spontaneous nature of interactions among devices. These systems are prone to security risks, such as eavesdropping and require different t...
Secure Device Association (also known as security initialization, first-connect or simply pairing in the literature) can be referred as the process of establishing a secure channel between a pair of devices in close proximity. There have been many recent proposals to provide secure pairing of devices in close proximity. All vary in their security a...
Continuous advancement in pervasive computing environment and proliferation of modern pervasive devices has increased interest in location aware applications, whereas determining location pose some special challenges. For example, pervasive computing applications require a well-defined representation of location knowledge to support location aware...
Recently, video streaming has been extensively used for information broadcasting. Availability of improved and enhanced transmission facilities make it possible to use video streaming in fast real time applications. Real time video transmission is widely used in surveillance, conferencing, media broadcasting and applications that include remote ass...
Tracking systems were first developed for the shipping industries to determine the position of ships and boats in the sea. Initially passive systems were developed to support in tracking and navigation for location-based applications. For the applications that require real time location information of the vehicle, these systems cannot be employed,...
Co-location of devices is a useful basis for access control policies for ad-hoc connections, as physical security, visibility and social norms provide reassurances to the device owners and participants. There are various possible techniques for demonstrating co-location through physical interactions, which others have started to explore. In some ca...